establishingsecurity / trustzone-rootkitLinks
TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.
☆14Updated 3 years ago
Alternatives and similar repositories for trustzone-rootkit
Users that are interested in trustzone-rootkit are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 years ago
- ☆14Updated 2 years ago
- CTF writeups☆9Updated 5 years ago
- IDA (sort of) headless☆24Updated last year
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated this week
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- ☆33Updated 2 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- binary ninja related code☆35Updated 2 months ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆35Updated 4 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Updated 6 years ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago
- Ditto.☆17Updated 4 years ago
- prebuild angr wheels for Windows on x86_64☆15Updated 6 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- ☆12Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago